Apple just released the fifth public beta for iOS 14 today, Wednesday, Aug. 19. This update comes one day after Apple released iOS 14 developer beta 5. It follows iOS 14 developer beta 4 by 15 days, and iOS 14 public beta 4 by 13 days. Apple released this new update to public ...more
Apple just released the fifth developer beta for iOS 14 today, Tuesday, Aug. 18. This update comes two weeks after Apple released iOS 14 developer beta 4, and 12 days after the release of iOS 14 public beta 4. Apple seeded this new update to developers at 10 a.m. PDT, the sta ...more
Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own h ...more
Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more
WELCOME & THANKzZz For Your Contribution, Support And Time...! ...Hello, zZz~AKA~StanDP Here...; There are many ways to tweak, change, enhance your internet experience to suite your needs, I will discuss a few things I did to enhance my online experience along with Fire-Fox ...more
Apple's iOS 16.3 update for iPhone had impressive new features, but iOS 16.4 might impress you even more. The latest iPhone update was released on Monday, March 27 — a day earlier than Apple Music Classical, Apple's new classical music streaming service — has at least 30 more ...more
With all the talk about privacy concerns recently, Google's name keeps coming up because they are a very data-driven company. As an Android user, they know basically everything about you based on your device usage. That can easily scare some people off who are worried about th ...more
Sometimes you might find that a certain app keeps sending you notifications. What are you to do? There are plenty of useful apps that might send one too many push notifications, but that doesn't mean you should dump them. Luckily, Android gives you complete control over how ea ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
With a root bounty of over $18,000 up for the taking, developers were highly motivated to get the AT&T and Verizon Wireless variants of the Samsung Galaxy S5 rooted. Legendary hacker George Hotz, aka Geohot, has won the race and can now step up to claim his prize. Hotz is not ...more
Android has a single text file named build.prop that determines tons of various system-wide settings on your device. You need root access to edit this file, since it's stored on the system partition—but the various lines of codes it contains are actually fairly easy to interpr ...more
Apple released the second beta for iOS 15 on Thursday, June 24. The update includes FaceTime's "SharePlay" feature for the first time, a new Maps icon, updates to Focus mode, in addition to many other changes and bug fixes. SharePlay, one of iOS 15's most ambitious new featur ...more
Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more
Router gateways are responsible for protecting every aspect of a network's configuration. With unfettered access to these privileged configurations, an attacker on a compromised Wi-Fi network can perform a wide variety of advanced attacks. Brute-Forcing Router Logins with Pat ...more
Apple just released its biggest update to iOS 17 yet, and there are 60 exciting new changes for your iPhone. With iOS 17.2, you get a brand new app, more Apple Music enhancements, upgrades in Messages, and a new security feature that was announced last year, as well as changes ...more
By using almost any packet-crafting tool, a hacker can perform denial-of-service (DoS) attacks. With the power to create just about any packet with any characteristics, a hacker can easily find one that will take down a host or network. Nmap and Hping are effective packet mani ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
QR codes are everywhere, from product packaging to airline boarding passes, making the scanners that read them a juicy target for hackers. Thanks to flaws in many of these proprietary scanning devices, it's possible to exploit common vulnerabilities using exploits packed into ...more
The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each ty ...more
While it's not usually the first thing everyone looks at after installing a new iOS software update, I'd give the new accessibility features on your iPhone priority attention because there are some highly valuable tools that even users without disabilities can enjoy. Of cours ...more
Your iPhone is full of features, many of which you might not even know about yet. Still, Apple keeps adding feature after feature with each new iOS update, and iOS 14.5 is no exception. The latest iOS version adds at least 69 features for your iPhone that you should be happy a ...more
Just days after Google released the official Android 11 update, Samsung already had a pre-beta build of One UI 3.0 available for developers to test their apps on. So this year's main OS upgrade is likely hitting Galaxy phones even earlier than we thought. Some features in the ...more
Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more
In the case of Apple Watch v. Fitbit, the winner comes down to the judge at hand. Apple currently offers two smartwatches — the Series 5 and the Series 3 — while Fitbit offers three models — the Fitbit Versa 2, Fitbit Ionic, and Fitbit Versa Lite. Whatever your assumptions abo ...more
SCRABBLE. To some it's just a game, but to me it's life or death. Well, not really, but it feels that way anyway. On a normal weekend, a game becomes much like Jon Thomas' "friendly game of death Scrabble." Video: . When I'm playing a game of SCRABBLE, my friends are not frien ...more
Installing and managing ROMs on your rooted Android phone can be a pain. You have to connect phone to computer a lot, and every time you load a new one you run the risk of it not working and having to start all over again. Fortunately, there's even an App for that! This video ...more
Watch this "Grease On Your Hands" video tutorial from the Washington Post to see how to change your dead car battery properly. When servicing any automobile, you should always wear appropriate eye-protection as well as ensure your working environment is properly ventilated. W ...more
Ever wanted to become a programmer? This Delphi Training Series: Programming 101 is a sequence of training videos designed to teach the complete beginner how to become a programmer using Delphi. Episode 1 and 2: the viewer is shown where they can download the free Integrated D ...more
Illustrator's gradient mesh tool is a powerful one for vector artists... if you know how to use it. This tool can help create beautiful and vivid mesh-based vector portraits, as long as your skills are up to par. If not, try out some of the beginner tutorials on WonderHowTo fo ...more
Recently, buyout talks between Google and Groupon ended with Groupon turning down Google's $6 million offer. But with Amazon backing LivingSocial, should they have? Your guess is as good as mine, but one thing's for sure— Groupon has a great voice, and they're sharing it with ...more
Changing the rear disc brakes on your 2001 Chrysler Town & Country (henceforth referred to as T&C) can be quite a challenge, but if you can spare a few hours (remember that you need to budget time to get the brake parts from the parts house) and are willing to get a little dir ...more
Moving a 2000 pound safe isn't easy... I was working as manager for a construction company that was performing an up fit on a century old building in downtown Concord, N.C. The owners wanted us to move a two thousand pound (that's a ton!) safe up to the second story so that i ...more
This is an intermediate guide on how to easily fix or retrieve data from a bad hard drive. What we're trying to do: 1. Fix a hard drive with a corruption problem (i.e., blue screen) or that is full of viruses to the point of being inoperable. 2. Retrieve data from a hard dr ...more
Recently, Avid announced the upcoming release of Pro Tools HD Native, and caused a lot of stir in the audio community. There’s plenty of information about this new gear out there, so I won’t drop a spec sheet on you, just yet. I do, however, want to talk about what exactly “N ...more
In this tutorial, we learn how to replace and install a kitchen faucet with Lowe's. Start out and check to see how many pipes you have underneath your faucet. After this, purchase your new faucet and all of the parts that go along with it. Once you have all of these, turn off ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more
Not sure what to do now that your kids are gone? Is the house feeling eerily quiet and empty? Check out this video and grab a few tips on how to turn 'empty nest syndrome' into an opportunity for some precious 'me time'. In no time at all, you will be adjusting into your new l ...more
A GFCI outlet (which stands for ground fault circuit interrupter) is a receptacle with its own built-in circuit breaker. It is intended to protect you from electric shock and your wiring and breaker panel from being “shorted out”. Building codes require that you have a GFCI o ...more
Fed up with the standard Android home screen, but don't want to root your smartphone? Then a launcher app is what you're looking for. It's nothing new, with past home screen launcher apps like LauncherPro, HelixLauncher and any from ADW Things, which transform your home screen ...more
No need to make a bad situation worse when running into an ex boyfriend or girlfriend. There is no need to be petty or spiteful when keeping to a nice yet vague conversation will ultimately leave you looking like a real class act. It’s bound to happen sooner or later, so you ...more
Add speed and power to your computer by adding more memory. You Will Need * Your computer's owner manual * An anti-static wrist band * A screwdriver * The right RAM for your computer WARNING: Working with electricity is dangerous. Be extremely careful and, if you have any dou ...more
Making your own circuit boards can be a daunting challenge. You have to design a schematic, test it on a breadboard, design the board layout, and then after all of that, you still have to print and etch a board! Luckily, we have Fritzing. Fritzing is a free open-source PCB d ...more
More password cracking action from Null Byte! Today we aren't going to be cracking passwords per se, rather, we are going to learn the basics of generating rainbow tables and how to use them. First, let's go over how passwords are stored and recovered. Passwords are normally ...more
These days, there seems to be an endless amount of music player apps accessible on the web, from Pandora to Cantio, and the amount available in the mobile market is constantly growing. If you have an Android device, you're probably well aware of Jukefox, which lets you listen ...more
Don't let that stuck drawer aggravate you on a daily basis; find the problem and fix it once and for all. Step 1: Remove the drawer Remove the drawer. Pull it out until it stops, then lift up the end and pull it a little bit more. This should release the drawer from its glid ...more
Problem: You're a PC gamer who absolutely loves The Elder Scrolls series and were eagerly anticipating the release of the newest game, Skyrim. But as much as you'd like to pick up the new game, money is tight. What do you do? Solution: Mods! The previous game in the Elder Sc ...more
If your bathroom faucet is old and leaky, it may be time for a replacement. But don't worry about expensive installation cost, because you can install it yourself! It's one of the easiest home maintenance repairs possible. Chrysten Cotney shows you the step-by-step DIY process ...more
In this video tutorial, viewers learn how to get tabs in Finder. This can only be done on the Mac OS X computers. Users will need to download the Total Finder application from the site provided in the video. Once downloaded and installed, this program will allow users to manag ...more
This video will show you the advantages of a shower wand and how to install one easily. A shower wand can help you clean the shower and clean pets too. To remove the shower head you will need a strap wrench. You may want to change the shower arm if it has too many scratches; u ...more
In this video, Mark Donovan of Home Addition Plus shows you to remove ceramic tiles from a shower. Before you begin, remove the shower head and shower handle, leaving the walls bare. A lot of dust and debris will be produced so you should wear safety glasses and to protect the ...more
A Tutorial: Ubuntu Linux is a completely free open-source operating system that has many useful features and abilities, and this guide will show you how to try this new OS without harming your Windows system, and it only takes five minutes to learn! This guide will show you ho ...more
If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC a ...more
Continued from Organize Yo'sef Part One! Clean Up! Once you have some boxes, bins and assorted storage ‘units’, mercilessly clear out the clutter. Be swift and meticulous (like a tidy ninja). Make four piles on the floor: Keep, Store, Toss, Donate. Keep the piles well separat ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
Now that Google+ is open to everyone, there are a lot of new people who aren't techies trying out the service. When you first sign on, it can be overwhelming. I've decided to round up a bunch of resources to help you get started, and recommend some people for you to follow, if ...more
For as long as I've loved SCRABBLE, I can't believe I've never come across this before. "CRAZIEST" - A short story by Liz Dubelman about words and numbers as a religion (think Pi), about SCRABBLE being the oracle, about her quest for the "triple-triple". This spoke words to m ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Are you looking to clean up the look of your Minecraft with something other than a simple texture pack? Do you sometimes experience lag spikes that drop you ...more
Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor. Tor runs your traffi ...more
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more
Minecraft mods (modifications) are additions to the game that change the way you play. They include texture packs, shaders, changes in gameplay, additions and subtractions and everything in between. Some of this information is very basic, other bits might help you along if you ...more